0% found this document useful (0 votes)
113 views10 pages

Computer F4 PP1 MS

The document is a marking scheme for the 2024 Form 4 Lanjet Examination in Computer Studies, detailing various questions and answers related to computer theory. It covers topics such as computer shutdown procedures, key functions, virus protection, memory characteristics, printer issues, and data security. Additionally, it includes sections on programming languages, database concepts, and changeover strategies in system implementation.

Uploaded by

amolakech157
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
113 views10 pages

Computer F4 PP1 MS

The document is a marking scheme for the 2024 Form 4 Lanjet Examination in Computer Studies, detailing various questions and answers related to computer theory. It covers topics such as computer shutdown procedures, key functions, virus protection, memory characteristics, printer issues, and data security. Additionally, it includes sections on programming languages, database concepts, and changeover strategies in system implementation.

Uploaded by

amolakech157
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

FORM 4 LANJET EXAMINATION

2024
MARKING SCHEME
COMPUTER STUDIES (THEORY)

1. State two reasons why it is advisable to follows the correct procedure when shutting down the
computer at all times. (2 marks)
To prevent lose of data/ information
To prevent corruption of files /programs
To protect computer hard disk from crashing

2. Name and give the function of the following key symbols.

(i) (1 mark)

Name: Shift key


Function Type alternate upper symbol if a keyboard key has two symbols or for typing uppercase letters.

(ii) (1 mark)

Name: Tab/ tabulator key


Function this key is used to move the text cursor at set intervals on the same line
3. A computer virus is a destructive program that attaches itself to other files and installs itself without
permission on the computer when the files are opened for use. Give three ways in which computers can
protected against virus attack (3marks)

Install the latest versions of anti-virus software on the computers/ frequently updating the antivirus
Software
Avoid using foreign removable disks in the computer room before scanning them
Scan files or programs before downloading / scanning e-mail file attachments before downloading
Avoid buying pirated software
Disable computer drives if the computers are used by many people
Install firewall to filter information coming through the internet or LAN
Educate computer users on dangers of viruses
1st 3 correct answers @ 1 mark max 3
4. State three characteristics of computer main memory (3 marks)

Have limited storage capacity


1
Store data/information/ programs temporally
Offers fast access to stored data
It a working memory
1st 3 correct answers @ 1 mark max 3

5. A printer fails to work as expected when a document is sent to be printed. The user has checked that the
on-line light of the printer is on and the printing paper is correctly inserted. Give two other
Possible reasons why the printing process failed. (2 marks)

Loose connection of printer data interface cable


Incorrect printer name chosen
Paper jam inside the printer
Data interface cable connected to wrong port
1st 2 correct answers @ 1 mark max 2

6. Describe the following terms as used in computer data security

a) Firewalls (1 mark)

A firewall is a device or software system that filters the data /information exchanged between different
networks by enforcing the host networks access control policy

b) Audit trail. (1 mark)

A study of an information system by experts in order to establish or find out all the weaknesses in the
system that could lead to security threats and weak access points for crimesters.

7. State four ways in which computers are used in banks (2 marks)

Transferring money electronically from one place to another by using EFT


Automation of cheque clearing and processing by using MICR
ATMs are used by customers to deposit or withdraw cash
Distributed processing mode has made it possible to share the processing loads a among several
computers located on different geographical locations but connected by a communication channel
Batch processing mode is used to prepare employees payrolls
N/B check on technology and activity
1st 4 correct answers @ 1 mark max 4

8. A student typed a passage in Microsoft word and the last line of the letter flowed to the second
page.
a) What name is given to such last line that flowed to the second page (1 mark)

widow

b) State three ways in which the student could have the letter to fit one page without changing the
paper size (3 marks)
2
Change page orientation
Change the character font
Decrease font size
Reduce page margins
Reduce character spacing
Reduce character line spacing
Change font style (Bold, italic
st
1 3 correct answers @ 1 mark max 3

9. Explain the following terms as used in Microsoft Excel spread sheet package. (3marks)

a) Range

A selected group of consecutive cells that can be manipulated as a block

b) What if analysis

A feature for forecasting an outcome of an activity changing values in a formula

c) Automatic recalculation

Results of a formula changes automatically if the values in one of the argument is changed.

10. State the data processing mode most appropriate for the following scenarios: (4 marks)

a) To prepare payroll for workers in Central Bank of Kenya

Batch processing

b) For automated production control in a chemical manufacturing industry

Real time processing mode

c) Managing ATMs transactions for KCB Ltd in different towns in the country

Distributed processing mode

d) Prepare examination report forms at the end of an academic year

Batch processing mode

11. A school has decided to network its computers so that it can distribute information to all its

Departments. The school also intends to upload the information to parents. The various services are

To be provided by servers. Briefly describe the services provided by (3marks) a)


Print server

3
Manages the printers that are connected to the network or manages the printing of user documents on
the network

b) File server
Stores network user’s data files

c) Mail server

Stores incoming mails for distribution to local users and sends out outgoing messages

12. Using an illustration, describe the term text direction as used in DTP (2 marks)
T
Changing the angular position of text √ 1 mark
E
X Illustration √ 1 mark
T
Accepts any correction illustration

13. I) define the following terms as used in a database

A). Attribute (1 mark)

A column / field name that describes the content of the row / fields under it in a table

b). Database model (1 mark)

A logical structure of a database that determines the manner in which data can be stored , organized
and manipulated

ii) State two objectives of normalization as used in databases (2 marks)

Remove record redundancy


Separate fields, records and tables
Organize related data items into appropriate tables
1st 2correct answers @ 1 mark max2

14. Differentiate between a system administrator and a database administrator as used in computers
(2 marks)

System administrator is a person who is responsible for the upkeep, configuration and reliable
operation of computer systems while a database administrator is a person who manages and
maintains database management software

4
N/B accept difference based on their responsibilities

15. State two advantages of using automated production in industries (2 marks)

Increased workspace safety


Reduced labour cost
Enhanced product quality
Reduced production lead time
st
1 2 correct answers @ 1 mark max 2

SECTION B

Answer question 16 and any other three questions from this section

16. a) State the best application area for the following programming language (4marks)
(i) FORTRAN - developing mathematical & scientific applications
(ii) Mercury - Developing AI application
(iii) PHP –developing web applications
(iv) C – developing system software

b) State two differences between compiler and interpreter (2marks)

Compiler Interpreter

Stores both source and object codes – no need Doesn’t store object code – translated every time
for translation every time program is run its run

Translates entire source code to object code at Translates line by line


once

c) Study the following pseudocode then answer the questions that follow:
Start
R =2
While R<=6 Do
Y=2 + (R^R) + 4
Print Y
R=R+2
End while
Stop

5
(i) Work out the output from the pseudocode (4marks)

R Output Y
2 8
4 22
6 42

(ii) Translate the above pseudocode to a flowchart (4marks)

start

R=2

Y = 2 + (R^R)+4

Print Y
R=R+2

Yes
R<=6?

No

6
Stop
17.a) Differentiate between the following:

(i) Intranet and Extranet (2marks)


Intranet – Interconnection of computers within an organisation
Extranet – connection of computers between two or more institutions
(ii) Modulation and demodulation (2marks)
Modulation is changing data signal from computer/DTE readable form to channel friendly form
Demodulation changing data packets/signal from channel friendly form to a computer readable
form
(iii) Dial-up and direct ISP connection (2marks)
Dial-up – the Internet connection is done on request/ contact e.i. on demand basis
Direct – Internet connection is done always

b) Explain the importance of the following

(i) Web portal (1mark)

Specially designed website that brings information from diverse sources, like emails, online
forums and search engines, together in a uniform way

(ii) Hyperlink (1mark)

Text/ image that when clicked opens a related web page or website

(iii) Blog (1mark)

7
A regularly updated website or web page, typically one run by an individual or small group, that is written
in an informal or conversational style

c) Name the parts in the following addresses:

(i) tkariuki@equitybank.co.ke (2marks)

 tkariuki – user name


 @ - at
 equitybank – host name
 co.ke - domain
(ii) www.starshines.sc.ke (2marks)

 www – world wide web


 starshines – host computer
 sc – lower level domain (a school)
 ke lower level domain(in Kenya)

d) Explain the concept of teleworking (2marks)

Combining several data signals into a common high speed and high bandwidth channel to avoid
need for many individual transmitting channels

18.a) Fill the gaps in the following table (6marks)

Category of software Use Example


Ms Publisher, Adobe
PageMaker, Corel Draw
DTP Preparation of publications

CAD Making technical drawings AutoCAD

Spreadsheets Used for statistical analysis of Ms Excel, Visicalc, Multiplan,


values Lotus 123

b) Name the disk management activity described below (5 marks)


(i) Creates logical drives in a disk - disk partitioning
(ii) Deletes idle files to create more disk space - disk clean up
(iii) Aligns tracks and sectors in a disk - disk formatting

8
(iv) Allows contents of a file to occupy contiguous sectors for faster access – disk defragmentation
(v) Creation of copies of important files on another drive- Disk Backup

c) Explain what the following commands will accomplish once executed


(i) C: \> Copy S* E: (2marks)
Copies all files whose names start with letter S from drive C to drive E

(ii) D:\>Deltree Subjects (2marks)

Deletes a tree directory named Subjects (the file together with its contents will be deleted)

19. a) Using examples of a school setup, explain the following changeover strategies
(9 marks)

i) Straight change over


It is where the old system is discarded immediately a new one is implemented. E.g. in a school setup, a
computerized exam analysis system when put in place, the manual one is discarded immediately

ii) Parallel change over


The old system and the new run together until the users are comfortable with the new system. In a school
setup, the fees collection is done manually and electronically by writing the bank slip number and the
amounts as the students arrive in school and recording the same in a computerized system

iii) Phased change over


The new system is introduced in stages until it is fully implemented. Example, the introduction on the new
curriculum in education.

Explanation of the concept @ 2 marks, relevant school example @ 1 mark

b) Give two implications of a poorly implemented system change over strategy (2 marks)
 failure to obtain anticipated benefits
 un expected time slippage
 cost overruns that vastly exceed budgets
 technical shortfalls resulting in performance that is significantly below the estimated level
1st two correct answer @ 1 mark max 2 marks

c) Explain any two characteristics of a system (4 marks)

i. Subsystems
 A system does not exist in solitude but maybe a component of a larger system
ii. Holistic thinking
 A system should be considered as a whole unit rather than considering its constituent parts
iii. Control
9
 The method by which the a system adopts to the changes in the environment in order to give
the expected feedback to perform to the expected level
iv. System entropy
 Systems naturally decay with time due to technological changes, new management policies or
change in user requirements
st
1 two correct explanation @ 2 marks; Stating @ 1mark, Description @ 1 mark

20. a) Give three ways of representing signed binary numbers in a computer (3 marks)

Ones complement
Twos Complement
Prefixing an extra sign bit
st
1 3 correct answers @ 1 mark max 3

b) Perform the following binary arithmetic and leave your answer in denary form (6 marks)

i) 1101.1012+1011.012+111.112

Ans = 100000.0012 Conversion = 32.12510

ii) 10001.10012-1011.1112
Ans 1.10112 Conversion = 1.687510

Correct Arithmetic calculation @1 mark Conversion @ 2 marks each max 3marks

c) Convert the following:


i) -3410 to twos complement (3 marks)

34 – 10010

1c – 01101

+ 1

2c - 011102

ii) 7 4/5 to binary (3 marks)

Ans = 111.і10ȯ2

Correct conversion of the integer number @ 1mark, Fraction @ 1mark , correct answer sequence @ 1mark

10

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy